CN102710601B - Method for security encryption and signing based on identity file - Google Patents

Method for security encryption and signing based on identity file Download PDF

Info

Publication number
CN102710601B
CN102710601B CN201210132720.4A CN201210132720A CN102710601B CN 102710601 B CN102710601 B CN 102710601B CN 201210132720 A CN201210132720 A CN 201210132720A CN 102710601 B CN102710601 B CN 102710601B
Authority
CN
China
Prior art keywords
client
information
file
server end
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210132720.4A
Other languages
Chinese (zh)
Other versions
CN102710601A (en
Inventor
罗喜召
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou University
Original Assignee
Suzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou University filed Critical Suzhou University
Priority to CN201210132720.4A priority Critical patent/CN102710601B/en
Publication of CN102710601A publication Critical patent/CN102710601A/en
Application granted granted Critical
Publication of CN102710601B publication Critical patent/CN102710601B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for security encryption and signing based on an identity file. The method includes: obtaining configuration information of basic setting of a client and configuration information of advanced encryption standard setting of the client; registering and applying the identity file applicable to a mailbox at a server end; downloading data information of the identity file through the client; obtaining type information of a task to be executed selected by the client; and performing encryption and decryption to files through the client according to the identity file. By the method, important data of a user can be protected from being viewed or modified, safe communication on an originally unsafe channel can be achieved, and denial behaviors after using the user's identity to receive and transmit information can be avoided.

Description

The safety encipher of identity-based file and endorsement method
Technical field
The present invention relates to a kind of software systems, particularly relate to a kind of safety encipher and endorsement method of identity-based file.
Background technology
This year; along with the high speed development of the Internet; people start to get more and more, more and more deep understanding and study the Internet knowledge; network is providing people easily simultaneously; but there is a lot of potential safety hazards; the file of the transmission of people and information usually can be revealed and be stolen, and bring very large inconvenience to the life of people, study and work.
Although the encryption and decryption mode of current file has a variety of, the coefficient of safety of these methods is not high, and insecure channels carries out file transfer, still there is the possibility revised by people and steal, so people need more satisfactoryly to ask valency encrypting and deciphering system.
Summary of the invention
The present invention, mainly for the deficiencies in the prior art, provides safety encipher and the endorsement method of a kind of fail safe identity-based file high, simple to operate.
To achieve these goals, the invention provides following technical scheme:
The safety encipher of identity-based file and an endorsement method, its step comprises:
Obtain the configuration information of the basic setup of client and the configuration information of Advanced Encryption Standard setting;
Register at server end and apply for an identification document being applicable to mailbox;
Client downloads also obtains the data message of described identification document;
Obtain the task kind of information of the needs execution selected in client;
According to the information of identification document, client is encrypted or decryption processing file.
As a preferred embodiment of the present invention, the configuration information of described basic setup comprises the kind of the verification algorithm that have employed SHA.
As a preferred embodiment of the present invention, the configuration information that described Advanced Encryption Standard is arranged comprises key length and operator scheme.
As a preferred embodiment of the present invention, described task kind comprises encrypt file and signature and declassified document certifying signature.
As a preferred embodiment of the present invention, describedly register at server end and apply for that the concrete steps being applicable to the identification document of mailbox comprise:
Server end obtains user name, password, Email, the information of identifying code and the approval information of user license agreement in enrollment form;
Carry out the location registration process of server end;
After succeeding in registration, be redirected to server end login interface;
Server end obtains and checking log-on message, and logs in;
After logining successfully, server end obtains and the application information of identity verification file;
Server end processes application information, and generates identification document;
Server end sends application information to client.
As a preferred embodiment of the present invention, the described information according to identification document, client is encrypted file or the concrete steps of decryption processing comprise:
If Choice encryption file is also signed, client obtains the file needing encryption;
Client obtains the Email of recipient, encryption method, storing path and digital signature information;
Client obtains corresponding identification document information;
Client is encrypted described file;
If select declassified document and certifying signature, client obtains the cryptograph files that will decipher;
Client obtains and the information of identity verification file;
Judge whether cryptograph files comprises digital signature, if comprise digital signature, cryptograph files is verified;
Obtain the preservation position of cryptograph files, and process is decrypted to cryptograph files.
As a preferred embodiment of the present invention, described encryption method comprises Advanced Encryption Standard and stream encryption algorithm.
As can be seen from technique scheme, the safety encipher of identity-based file of the present invention and endorsement method, can help user to protect significant data thus do not checked or revise, and can realize secure communication on this unsafe channel; Meanwhile, can also prevent with the behavior denied after user's name sending and receiving information.
Accompanying drawing explanation
Fig. 1 the present invention is based on the safety encipher of identification document and the structural representation of endorsement method one preferred embodiment.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment of the present invention is described in detail, can be easier to make advantages and features of the invention be readily appreciated by one skilled in the art, thus more explicit defining is made to protection scope of the present invention.
Consult Fig. 1, Fig. 1 the present invention is based on the safety encipher of identification document and the structural representation of endorsement method one preferred embodiment.
The safety encipher of identity-based file and an endorsement method, its step comprises: obtain the configuration information of the basic setup of client and the configuration information of Advanced Encryption Standard setting; Register at server end and apply for an identification document being applicable to mailbox; Client downloads also obtains the data message of described identification document; Obtain the task kind of information of the needs execution selected in client; According to the information of identification document, client is encrypted or decryption processing file.
The configuration information of described basic setup comprises the kind of the verification algorithm that have employed SHA, a kind of can calculating corresponding to a digital massage of SHA (Secure Hash Algorithm) is arrived, the algorithm of the character string (also known as eap-message digest) that length is fixing, like this can according to the different demand of people, select different verification algorithms, easy for people to use.
The configuration information that described Advanced Encryption Standard is arranged comprises key length and operator scheme.
Described task kind comprises encrypt file and signature and declassified document certifying signature, the encryption and decryption process of file is separated, the more convenient choice and operation of people.
Describedly register at server end and apply for that the concrete steps being applicable to the identification document of mailbox comprise: server end obtains information and the user of user name, password, Email, identifying code in enrollment form
The approval information of permission agreement; Carry out the location registration process of server end; After succeeding in registration, be redirected to server end login interface; Server end obtains and checking log-on message, and logs in; After logining successfully, server end obtains and the application information of identity verification file; Server end processes application information, and generates identification document; Server end sends application information to client.The identification document applying for obtaining can be made so safer, prevent from being intercepted and captured by people in transmission diagram and revising.
The described information according to identification document, client is encrypted file or the concrete steps of decryption processing comprise:
If Choice encryption file is also signed, client obtains the file needing encryption; Client obtains the Email of recipient, encryption method, storing path and digital signature information; Client obtains corresponding identification document information; Client is encrypted described file.
If select declassified document and certifying signature, client obtains the cryptograph files that will decipher; Client obtains and the information of identity verification file; Judge whether cryptograph files comprises digital signature, if comprise digital signature, cryptograph files is verified; Obtain the preservation position of cryptograph files, and process is decrypted to cryptograph files.
By digital signature, the integrality of file is easy to checking, also ensure that others can not falsely use your identity transmission file simultaneously.
Described encryption method comprises Advanced Encryption Standard and stream encryption algorithm.
The safety encipher of identity-based file of the present invention and endorsement method, can help user to protect significant data thus do not checked or revise, and can realize secure communication on this unsafe channel; Meanwhile, can also prevent with the behavior denied after user's name sending and receiving information.
The above; be only the embodiment of the preferred embodiment of the present invention; but protection scope of the present invention is not limited thereto; any those of ordinary skill in the art are in the technical scope disclosed by the present invention; the change can expected without creative work or replacement, all should be encompassed within protection scope of the present invention.

Claims (6)

1. the safety encipher of identity-based file and an endorsement method, it is characterized in that, step comprises:
Obtain the configuration information of the basic setup of client and the configuration information of Advanced Encryption Standard setting;
Register at server end and apply for an identification document being applicable to mailbox;
Client downloads also obtains the information of described identification document;
Obtain the task kind of information of the needs execution selected in client;
According to the information of identification document, client is encrypted or decryption processing file, and concrete steps comprise:
If Choice encryption file is also signed, client obtains the file needing encryption;
Client obtains the Email of recipient, encryption method, storing path and digital signature information;
Client obtains the information of corresponding identification document;
Client is encrypted described file;
If select declassified document and certifying signature, client obtains the cryptograph files that will decipher;
Client obtains and the information of identity verification file;
Judge whether cryptograph files comprises digital signature, if comprise digital signature, cryptograph files is verified;
Obtain the preservation position of cryptograph files, and process is decrypted to cryptograph files.
2. the safety encipher of identity-based file according to claim 1 and endorsement method, it is characterized in that, the configuration information of described basic setup comprises the kind of the verification algorithm that have employed SHA.
3. the safety encipher of identity-based file according to claim 1 and endorsement method, is characterized in that, the configuration information that described Advanced Encryption Standard is arranged comprises key length and operator scheme.
4. the safety encipher of identity-based file according to claim 1 and endorsement method, is characterized in that, described task kind comprises encrypt file and signature and declassified document certifying signature.
5. the safety encipher of identity-based file according to claim 1 and endorsement method, is characterized in that, describedly registers at server end and apply for that the concrete steps being applicable to the identification document of mailbox comprise:
Server end obtains user name, password, Email, the information of identifying code and the approval information of user license agreement in enrollment form;
Carry out the location registration process of server end;
After succeeding in registration, be redirected to server end login interface;
Server end obtains and checking log-on message, and logs in;
After logining successfully, server end obtains and the application information of identity verification file;
Server end processes application information, and generates identification document;
Server end sends application information to client.
6. the safety encipher of identity-based file according to claim 1 and endorsement method, it is characterized in that, described encryption method comprises Advanced Encryption Standard and stream encryption algorithm.
CN201210132720.4A 2012-05-03 2012-05-03 Method for security encryption and signing based on identity file Expired - Fee Related CN102710601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210132720.4A CN102710601B (en) 2012-05-03 2012-05-03 Method for security encryption and signing based on identity file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210132720.4A CN102710601B (en) 2012-05-03 2012-05-03 Method for security encryption and signing based on identity file

Publications (2)

Publication Number Publication Date
CN102710601A CN102710601A (en) 2012-10-03
CN102710601B true CN102710601B (en) 2015-07-22

Family

ID=46903157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210132720.4A Expired - Fee Related CN102710601B (en) 2012-05-03 2012-05-03 Method for security encryption and signing based on identity file

Country Status (1)

Country Link
CN (1) CN102710601B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618120B (en) * 2015-03-04 2018-01-23 青岛微智慧信息有限公司 A kind of mobile terminal key escrow digital signature method
CN109729088B (en) * 2018-12-29 2022-01-25 广东盈世计算机科技有限公司 Mail processing method
CN109756343B (en) * 2019-01-31 2021-07-20 平安科技(深圳)有限公司 Authentication method and device for digital signature, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602601A (en) * 2001-10-12 2005-03-30 Geo信托有限公司 Methods and systems for automated authentication, processing and issuance of digital certificates
CN1835434A (en) * 2006-04-10 2006-09-20 北京易恒信认证科技有限公司 Electronic mail system and method based on CPK safety authentication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7395430B2 (en) * 2001-08-28 2008-07-01 International Business Machines Corporation Secure authentication using digital certificates

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602601A (en) * 2001-10-12 2005-03-30 Geo信托有限公司 Methods and systems for automated authentication, processing and issuance of digital certificates
CN1835434A (en) * 2006-04-10 2006-09-20 北京易恒信认证科技有限公司 Electronic mail system and method based on CPK safety authentication

Also Published As

Publication number Publication date
CN102710601A (en) 2012-10-03

Similar Documents

Publication Publication Date Title
EP3869730B1 (en) Confidential communication management
CN111512608B (en) Trusted execution environment based authentication protocol
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN105025019B (en) A kind of data safety sharing method
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN112597523B (en) File processing method, file conversion encryption machine, terminal, server and medium
JP2014527787A (en) Communication method for authentication using fingerprint information
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN109362074A (en) The method of h5 and server-side safety communication in a kind of mixed mode APP
CN110071937B (en) Login method, system and storage medium based on block chain
CN113114668A (en) Information transmission method, mobile terminal, storage medium and electronic equipment
CN102404337A (en) Data encryption method and device
CN104253801A (en) Method, device and system for realizing login authentication
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN114143082A (en) Encryption communication method, system and device
CN104468478A (en) Mail encryption method
GB2501069A (en) Authentication using coded images to derive an encrypted passcode
CN104270380A (en) End-to-end encryption method and system based on mobile network and communication client side
WO2018033017A1 (en) Terminal state conversion method and system for credit granting
CN105871858A (en) Method and system for ensuring high data safety
ES2926968T3 (en) A first entity, a second entity, an intermediate node, methods for establishing a secure session between a first and a second entity, and software products
CN102710601B (en) Method for security encryption and signing based on identity file
CN105022962A (en) Encryption protection method of network hard disk data content
CN113630412A (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN104394532A (en) Anti-brute force safe log-in method for mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150722

Termination date: 20210503

CF01 Termination of patent right due to non-payment of annual fee